Sciweavers

1022 search results - page 168 / 205
» Towards an Evaluation Methodology for Computational Trust Sy...
Sort
View
VEE
2006
ACM
106views Virtualization» more  VEE 2006»
14 years 1 months ago
Using VMM-based sensors to monitor honeypots
Virtual Machine Monitors (VMMs) are a common tool for implementing honeypots. In this paper we examine the implementation of a VMM-based intrusion detection and monitoring system ...
Kurniadi Asrigo, Lionel Litty, David Lie
SIGMOD
2012
ACM
220views Database» more  SIGMOD 2012»
11 years 10 months ago
GUPT: privacy preserving data analysis made easy
It is often highly valuable for organizations to have their data analyzed by external agents. However, any program that computes on potentially sensitive data risks leaking inform...
Prashanth Mohan, Abhradeep Thakurta, Elaine Shi, D...
CHI
2009
ACM
14 years 8 months ago
Attaching UI enhancements to websites with end users
We present reform, a system that envisions roles for both programmers and end users in enhancing existing websites to support new goals. First, programmers author a traditional ma...
Michael Toomim, Steven M. Drucker, Mira Dontcheva,...
CHI
2003
ACM
14 years 8 months ago
GAZE-2: conveying eye contact in group video conferencing using eye-controlled camera direction
GAZE-2 is a novel group video conferencing system that uses eye-controlled camera direction to ensure parallaxfree transmission of eye contact. To convey eye contact, GAZE-2 emplo...
Roel Vertegaal, Ivo Weevers, Changuk Sohn, Chris C...
DSN
2007
IEEE
14 years 2 months ago
Using Process-Level Redundancy to Exploit Multiple Cores for Transient Fault Tolerance
Transient faults are emerging as a critical concern in the reliability of general-purpose microprocessors. As architectural trends point towards multi-threaded multi-core designs,...
Alex Shye, Tipp Moseley, Vijay Janapa Reddi, Josep...